![[Featued image] A cybersecurity analyst is working from home and is learning about public keys.](https://images.ctfassets.net/wp1lcwdav1p1/7GUAbhvT0xxUSrztr8Bron/b1d0f475f4b77045541810dd2d13fec6/pnYvlnPw.jpeg?w=330&h=216&q=60&fit=fill&f=faces&fm=jpg&fl=progressive)
What Is a Public Key?
Learn what a public key is, how it relates to public key encryption, and when you might need to use one.
October 15, 2024
Article
Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact-checkers. Our articles are deeply researched and thoroughly reviewed to ensure we are providing trustworthy information and advice for any topic. We understand that taking the next step in your education or career can raise questions. We are here to provide actionable, reliable, and relevant answers so you can achieve your goals.